Skip to main content

Advertisement

Log in

Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

With the rapid increase in number of sensing devices for healthcare, researchers are getting growing interest due to wide application support and new challenging scenarios. Internet of Things (IoT) comprises of huge number of connected devices with a variety of sensing support especially in medical health parameters sensing. In these scenarios, secure data collection and transmission to centralized servers is quite challenging to protect against several attacks for illegal data access. Existing solutions suffer from storage, communication and energy overheads. To resolve these issues, this paper presents a FoG assisted scheme for healthcare data aggregation in a secure and efficient manner.. We have involved the peer-to-peer communication between healthcare sensing devices and wearables to share secret data with an aggregating node that can share data with FoG server. In this scenario, an aggregator may be away from FoG server and cannot transmit data directly. However, it can share the encrypted data with the neighboring aggregator to transmit data to FoG server by appending in its current aggregated data. FoG server can extract the required values from the data and can save in the local repository that can be further updated later in cloud repositories. For these functionalities, we have presented two algorithms for message receiving at aggregator and message extraction at FoG server. Moreover, compression mechanism is also presented to further reduce the communication costs. We have performed simulations using TCL and C files in NS2.35 to generate trace files and then executed AWK scripts to extract results. Results prove the supremacy of proposed scheme over existing schemes in terms of storage, communication, transmission ratio, energy consumption and resilience.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Atzori L, Iera A, Morabito G (2010) Internet of things: a survey. Comput Netw 54:2787–2805

    Article  Google Scholar 

  2. Ning H (2013) Unit and ubiquitous internet of things. CRC Press

  3. Akyildiz IF, Kasimoglu IH (2004) Wireless sensor and actor networks: research challenges. Ad Hoc Netw 2(4):351–367

    Article  Google Scholar 

  4. Kulkarni A, Sathe S (2014) Healthcare applications of the internet of things: a review. International Journal of Computer Science and Information Technologies 5(5):6229–6232

    Google Scholar 

  5. Bhasker L (2014) Genetically derived secure cluster-based data aggregation in wireless sensor networks. IET Information Security 8(1):1–7

    Article  Google Scholar 

  6. Suhardi AR (2016) A survey of security aspects for internet of things in healthcare. In: Kim K, Joukov N (eds) Information science and applications (ICISA), lecture notes in electrical engineering, vol 376. Springer, Singapore, pp 1237–1247

    Google Scholar 

  7. Kupwade Patil H, Seshadri R (2014) Big data security and privacy issues in healthcare. In: IEEE International Congress on Big Data, Anchorage, pp 762–765

  8. Luo X, Zhang D, Yang LT, Liu J, Chang X, Ning H (2016) A kernel machine-based secure data sensing and fusion scheme in wireless sensor networks for the cyber-physical systems. Futur Gener Comput Syst 61:85–96

    Article  Google Scholar 

  9. Kodali RK, Swamy G, Lakshmi B (2015) An implementation of IoT for healthcare. In: IEEE Recent Advances in Intelligent Computational Systems (RAICS), Trivandrum, pp 411–416

  10. Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42

    Article  Google Scholar 

  11. Marjani M et al (2017) Big IoT data analytics: Architecture,opportunities and open research challenges. IEEE Access 5:5247–5261

    Article  Google Scholar 

  12. Islam SMR, Kwak D, Kabir MH, Hossain M, Kwak K (2015) The internet of things for health care: a comprehensive survey. IEEE Access 3:678–708

    Article  Google Scholar 

  13. Mahmood Z, Ning H, Ullah A, Yao X (2017) Secure authentication and prescription safety protocol for telecare health services using ubiquitous IoT. Appl Sci 7(10):1069

    Article  Google Scholar 

  14. Patel PD, Pranav B, Ravindra V (2012) Data aggregation in wireless sensor network. International Journal of Management, IT and Engineering (IJMIE) 2(7):457–472

    Google Scholar 

  15. Akkaya K, Ari I (2008) In-network data aggregation in wireless sensor networks. In: Bidgoli H (ed) Handbook of computer networks, vol 2. John Wiley & Sons, Hoboken, pp 1131–1146

    Google Scholar 

  16. Fasolo E, Rossi M, Widmer J, Zorzi M (2007) In-network aggregation techniques for wireless sensor networks: a survey. IEEE Wirel Commun 14:70–87

    Article  Google Scholar 

  17. Gelogo YE, Kim H (2015) A design of secure e-health data management system. Journal of Security Engineering 12(2):181–190

    Article  Google Scholar 

  18. Othman SB, Trad A, Youssef H (2013) Secure data aggregation with MAC authentication in wireless sensor networks. In Proc. 12th IEEE international conference on trust, security and privacy in computing and communications, pp-188–195

  19. Mantri D, Prasad NR, Prasad R. (2012) Grouping of clusters for efficient data aggregation (GCEDA) in wireless sensor network. In Proc. IEEE international advance computing conference (IACC), pp-132–137

  20. Barak A, Gulia P (2012) Data compression in wireless sensor network. In: International journal of Computer Science & Management Studies (IJCSMS), vol. no12, pp-93-96

    Google Scholar 

  21. Jose J, Kumar SM, Jose J (2013) Energy efficient recoverable concealed data aggregation in wireless sensor networks. In Proc IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICECCN), pp-332-329, 2013

  22. Hu L, Evans D (2003) Secure aggregation for wireless networks. In Proc. security and Assurance in ad hoc networks (SAAN), pp. 1–8

  23. Lin X, Lu R, Shen X (2010) MDPA: multidimensional privacy preserving aggregation scheme for wireless sensor networks. Wiley Journal of Wireless Communication and Mobile Computing 10(6):843–856

    Google Scholar 

  24. Han S, Zhao S, Li Q, Ju C, Zhou W (2016) PPM-HDA: privacy-preserving and multifunctional health data aggregation with fault tolerance. IEEE Transactions on Information Forensics and Security 11(9):1940–1955

    Article  Google Scholar 

  25. Zhang K, Liang X, Baura M, Lu R, Shen X (2014) PHDA: a priority based health data aggregation with privacy preservation for cloud assisted WBANs. Inf Sci 284:130–141

    Article  MathSciNet  Google Scholar 

  26. Zhang C, Li C, Zhang J (2015) A secure privacy-preserving data aggregation model in wearable wireless sensor networks. Journal of Electrical and Computer Engineering 2015(61):1–9

    MathSciNet  Google Scholar 

  27. Huang S-I, Shieh S, Tygar JD (2010) Secure encrypted-data aggregation for wireless sensor networks. Journal of Wireless Networks 16(4):915–927

    Article  Google Scholar 

  28. Gunasekaran P, Sivakumar B (2012) Encryption and signature scheme implementation for data integrity using recoverable concealed data aggregation. International Journal of Electronics and Computer Science Engineering 01(04):2417–2423

    Google Scholar 

  29. Mekikis P, Antonopoulos A, Kartsakli E, Passas N, Alonso L, Verikoukis C (2017) Stochastic modeling of wireless charged wearables for reliable health monitoring in hospital environments. IEEE International Conference on Communications (ICC), Paris, France:1–6

  30. Sharma S, Chen K, Sheth A (2018) Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems. IEEE Internet Comput 22(2):42–51

    Article  Google Scholar 

  31. Yang Y, Liu X, Deng RH (2018) Lightweight break-glass access control system for healthcare internet-of-things. in IEEE Transactions on Industrial Informatics 14(8):3610–3617

    Article  Google Scholar 

  32. Lalos AS et al (2015) RLNC-aided cooperative compressed sensing for energy efficient vital signal Telemonitoring. IEEE Trans Wirel Commun 14(7):3685–3699

    Article  Google Scholar 

Download references

Acknowledgements

This work was funded by the National Natural Science Foundation of China for Grant 61471035 and 61774014

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huansheng Ning.

Ethics declarations

Conflicts of interest

The authors declare that there is no conflict of interest.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ullah, A., Said, G., Sher, M. et al. Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN. Peer-to-Peer Netw. Appl. 13, 163–174 (2020). https://doi.org/10.1007/s12083-019-00745-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-019-00745-z

Keywords

Navigation